Anomaly Exposure in Network Traffic and its collision: a Survey
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 10
Abstract
Antagonistic network traffic is frequently "diverse” from kind traffic in ways that can be classified without knowing the way of the attack. Anomaly exposure is a significant problem that has been investigates within diverse research areas and application domains. Many anomaly exposure techniques have been specifically residential for certain application domains, while others are more generic. These survey papers provide a ordered and complete overview of the research on anomaly exposure. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each group we have recognized key assumptions, which are used by the method to distinguish between normal and anomalous behavior. For each category, we discuss a basic anomaly exposure technique, and then show how the different accessible techniques in that group are variants of the basic technique. Here our paper focus on anomaly exposure in network and its impact over the network and classify the different technique for detecting anomaly in network
Authors and Affiliations
Saurabh Ratnaparkhi , Anup Bhange
Ontology construction and query indexing technique to improve query indexing time, precision and number of good pages visited
For The existing search engines have many issues. In this research we have considered the issue of query processing in hakia search engines. Current search is done on ranking based query processing means displaying r...
PERVASIVE AUTHENTICATION AND AUTHORIZATION INFRASTRUCTURES FOR MOBILE USERS USING PERVASIVE-PKI
In computer science distributed systems could be more secured with a distributed trust model based on PKI. PKI provides a framework to verify the identities of each entities of given domain. Network and device heterogene...
Balanced window size Allocation Mechanism for Congestion control of Transmission Control Protocol based on improved bandwidth Estimation.
TCP is the widely used protocol for its reliable data communication over the network. Though it is used for enabling communication over the large network, it has some incapability in handling continues data transmission...
Simulated Annealing optimized PID Controller design using ISE, IAE, IATE and MSE error criteria
A PID controller is designed using ISE, IAE, ITAE and MSE error criteria for stable linear time invariant continuous system. A Simulated Annealing PID controller is designed for the plant to meet the desired performance...
A Survey on content Anatomy Approach to Temporal Topic Summarization
content anatomy approach is an emerging research area in Content mining. In this approach, content anatomy approach defines a task called topic anatomy. Topic anatomy summarizes and associates the core parts of a top...